Security Protocols

15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5964)

Table of contents

  1. Front Matter
  2. Micah Sherr, Eric Cronin, Matt Blaze
    Pages 3-12
  3. Amerson Lin, Mike Bond, Jolyon Clulow
    Pages 20-33
  4. Marcus C. Granado
    Pages 37-57
  5. Shishir Nagaraja
    Pages 58-73
  6. Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zieliński
    Pages 81-97
  7. Alf Zugenmaier, Julien Laganier, Anand Prasad, Kristian Slavov
    Pages 104-109
  8. Thomas Tjøstheim, Thea Peacock, Peter Y. A. Ryan
    Pages 114-130
  9. Bruce Christianson, Jun Li
    Pages 133-138
  10. Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross Anderson, Ronald L. Rivest
    Pages 147-149
  11. Jaap-Henk Hoepman
    Pages 152-165

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. The topics addressed reflect the question "When is a Protocol Broken?" and how can it degrade gracefully in the face of partially broken assumptions, or how can it work under un(der)specified assumptions.

Keywords

grid computing hash functions information leakage isotropic channels measurable security privacy public keys secure sessions security protocols signatures social networks theorem proving voting systems

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 1
  • Michael Roe
    • 3
  1. 1.Computer Science DepartmentUniversity of HertfordshireHatfieldUK
  2. 2.University of TrentoTrentoItaly
  3. 3.Microsoft Research Ltd.,CambridgeUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-17773-6
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17772-9
  • Online ISBN 978-3-642-17773-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book